Search results
1 – 10 of 313Christiaan Ernst (Riaan) Heyman
This study aims to, firstly, develop a red flag checklist for cryptocurrency Ponzi schemes and, secondly, to test this red flag checklist against publicly available marketing…
Abstract
Purpose
This study aims to, firstly, develop a red flag checklist for cryptocurrency Ponzi schemes and, secondly, to test this red flag checklist against publicly available marketing material for Mirror Trading International (MTI). The red flag checklist test seeks to establish if MTI’s marketing material posted on YouTube® (in the form of a live video presentation) exhibits any of the red flags from the checklist.
Design/methodology/approach
The study uses a structured literature review and qualitative analysis of red flags for Ponzi and cryptocurrency Ponzi schemes.
Findings
A research lacuna was discovered with regard to cryptocurrency Ponzi scheme red flags. By means of a structured literature review, journal papers were identified that listed and discussed Ponzi scheme red flags. The red flags from the identified journal papers were subsequently used in a qualitative analysis. The analyses and syntheses resulted in the development of a red flag checklist for cryptocurrency Ponzi schemes, with five red flag categories, containing 18 associated red flags. The red flag checklist was then tested against MTI’s marketing material (a transcription of a live YouTube presentation). The test resulted in MTI’s marketing material exhibiting 88% of the red flags contained within the checklist.
Research limitations/implications
The inherent limitations in the design of using a structured literature review and the lack of research regarding the cryptocurrency Ponzi scheme red flags.
Practical implications
The study provides a red flag checklist for cryptocurrency Ponzi schemes. The red flag checklist can be applied to a cryptocurrency investment scheme’s marketing material to establish if it exhibits any of these red flags.
Social implications
The red flag checklist can be applied to a cryptocurrency investment scheme’s marketing material to establish if it exhibits any of these red flags.
Originality/value
The study provides a red flag checklist for cryptocurrency Ponzi schemes.
Details
Keywords
This paper aims to introduce the concept of using the well-established Shared Lives approach to support survivors of domestic abuse with complex needs including those with…
Abstract
Purpose
This paper aims to introduce the concept of using the well-established Shared Lives approach to support survivors of domestic abuse with complex needs including those with learning and physical disabilities, older people and carers.
Design/methodology/approach
Survivors with complex needs are often excluded from traditional domestic abuse support services thus increasing their risk and making recovery impossible. Using the Shared Lives approach in suitable cases could address gaps in provision and improve the outcomes for survivors with disabilities, older survivors and carers.
Findings
The paper draws on evidence from reports and research about the experiences of these cohorts of survivors to explain how the Shared Lives approach could increase support options for specific categories of survivors.
Practical implications
Using the Shared Lives approach to support cohorts of victims/survivors who experience barriers to accessing support could improve outcomes for these people, reduce risk of serious harm and improve quality of life.
Originality/value
With the recent recommendation from Association of Directors of Adult Social Services around increasing use of Shared Lives, this paper provides one potential way to meet this recommendation.
Details
Keywords
This chapter presents a genderwashing critique of UK historic universities. Taking an interdisciplinary approach, it conceptualizes genderwashing and gender-based violence (GBV)…
Abstract
This chapter presents a genderwashing critique of UK historic universities. Taking an interdisciplinary approach, it conceptualizes genderwashing and gender-based violence (GBV). Underpinned by feminist subjectivity, raising consciousness to women's situated lived experiences, examples of public declarations of gender equality by UK historic universities are considered alongside women's experiences of GBV. Using Walter's (2022) genderwash varieties, university hypocrisy is illustrated by women academic handmaidens, abuse of women in Professional Services, and women standing up to GBV. This chapter contributes “Eradicating and Silencing Women’”and “Asking the Minority to Fix It” as genderwash processes, theorizing how genderwashing (or genderbleaching) in historic universities not only perpetuates the falsehood of practicing equality but also provides a veil to conceal GBV.
Details
Keywords
Dong-Heon Kwak, Dongyeon Kim, Saerom Lee, Martin Kang, Soomin Park and Deborah Knapp
Social networking sites (SNS) have become popular mediums for individuals to interact with others. However, despite the positive impact of SNS on people’s lives, cyberbullying has…
Abstract
Purpose
Social networking sites (SNS) have become popular mediums for individuals to interact with others. However, despite the positive impact of SNS on people’s lives, cyberbullying has become prevalent. Due to this prevalence, substantial research has examined cyberbullying from the perspectives of perpetrators, bystanders, and victims, but little is known about SNS users’ confrontations with cyberbullying. The objectives of this study are to examine confrontation as a victim’s coping response, the effect of blockability affordance on victims’ protection motivation, the impact of a victim’s experiences with cyberbullying perpetration, and social desirability (SD) bias in the context of cyberbullying victimization.
Design/methodology/approach
This study examines the effect of blockability affordance on SNS users’ protection motivation. It also investigates the relationships among perceived threat, perceived coping efficacy, and use of confrontation. Furthermore, this investigation analyzes the effect of SNS users’ experiences as perpetrators on their decision to confront cyberbullies. Finally, this study assesses and controls SD bias in SNS users’ confrontation behavior. To test the research model, we used an online vignette study to collect 314 data points.
Findings
Blockability affordance, perceived threat, perceived coping efficacy, and cyberbullying perpetration experiences are essential factors in explaining use of confrontation. This study also finds SD bias in the context of cyberbullying victimization.
Originality/value
This is one of the first studies in information systems research to empirically examine the effect of blockability affordance in the context of cyberbullying.
Details
Keywords
Kawon Kim and Bongki Woo
This study aims to investigate the effects of workplace racial discrimination among Asian American (AA) employees in the restaurant industry and examines what kinds of employee…
Abstract
Purpose
This study aims to investigate the effects of workplace racial discrimination among Asian American (AA) employees in the restaurant industry and examines what kinds of employee coping responses can mitigate its detrimental effects on their work behaviors.
Design/methodology/approach
This paper uses an exploratory sequential mixed-methods approach, starting with a qualitative study using the critical incident technique followed by a quantitative between-subjects experiment to examine the impact of employee coping responses to racial discrimination on employee competence and work quality of life (WQOL).
Findings
The study reveals that customer-perpetrated racial discrimination is the most common form of racial discrimination that AA employees face in the restaurant industry. In addition, confrontation is the most effective coping strategy to increase employee’s self-competence. Also, the severity of discrimination moderates the effect of coping strategies on employee’s self-competence. Employees’ self-competence mediates the relationship between their response strategy against discrimination and their WQOL.
Research limitations/implications
The findings of this study suggest that confrontation is an effective coping strategy for targeted employees, compared to support-seeking or avoidance. Confrontation was perceived as competent, compared to other coping strategies, and in turn, enhanced WQOL.
Originality/value
This study expands the scope of racial discrimination research in the hospitality literature for the growing diversified hospitality workforce. In addition, this study provides practical insights into competent ways of coping with racial discrimination.
Details
Keywords
Giulia Pisano, B. Kennath Widanaralalage and Dominic Willmott
This study aims to investigate the experiences of service providers supporting male victims and female perpetrators of intimate partner violence (IPV). The study explored the…
Abstract
Purpose
This study aims to investigate the experiences of service providers supporting male victims and female perpetrators of intimate partner violence (IPV). The study explored the drivers, methods and treatments of female-perpetrated IPV, the nature and impact of abuse towards male victims, the barriers and facilitators to service provision and the impact on the practitioners themselves.
Design/methodology/approach
The study used a qualitative approach, using reflexive thematic analysis to analyse semi-structured interviews with 13 experienced service providers.
Findings
Two overarching themes were identified: systemic issues in service provision, including challenges with multi-agency approaches, funding and availability of services and the impact on practitioners; and gender stereotypes, which created barriers to male victims' help-seeking and influenced the treatment of female perpetrators.
Practical implications
The findings suggest the need for a multi-level approach, addressing gendered inequalities in IPV policy and funding, implementing gender-inclusive, evidence-based and trauma-informed practices, and raising public and professional awareness to challenge the dominant “domestic violence stereotype”.
Originality/value
This study provides a detailed, in-depth exploration of the experiences of service providers supporting “non-typical” populations in IPV, revealing the complex, multi-faceted challenges they face within a system that is inherently designed to support female victims of male perpetrators.
Details
Keywords
Sanket Dash, Sushant Ranjan, Neha Bhardwaj and Siddhartha K. Rastogi
The study aims to understand the phenomenon of workplace ostracism from multiple perspectives (target, perpetrator and observer). The understanding of the phenomenon is used to…
Abstract
Purpose
The study aims to understand the phenomenon of workplace ostracism from multiple perspectives (target, perpetrator and observer). The understanding of the phenomenon is used to thematically analyse the antecedents of workplace ostracism and identify appropriate strategies for each antecedent.
Design/methodology/approach
The study findings are based on face-to-face semi-structured interviews with thirty-three senior and medium-level employees from various public and private sector organizations in India. The interview transcripts were systematically analyzed to identify antecedents of ostracism, which were inductively grouped together based on similarity.
Findings
The antecedents of workplace ostracism were grouped into four major heads: perceived non-alignment with organizational needs; emotional reaction; unconscious social processes and structural and demographic differences. Based on interview transcripts, strategies to reduce the effect of each of the broad antecedents of ostracism were identified.
Practical implications
Workplace ostracism has been linked with multiple negative outcomes including increased stress and turnover intention. The study provides managers with a framework that enables them to evaluate and understand incidences of ostracism among their subordinates. The study also equips managers with the knowledge of specific strategies for dealing with specific antecedents of ostracism.
Originality/value
The study answers the need to look at the phenomenon of ostracism through multiple perspectives. It identifies multiple potentially new antecedents and strategies to deal with workplace ostracism and groups them in a coherent manner. It is among the few studies on ostracism in India and extends the generalizability of the construct.
Details
Keywords
Fred Awaah, Andrew Tetteh and Dorcas Adomaa Addo
This study aims to examine the effects of cyberbullying on the academic lives of Ghanaian university students. It also establishes whether cyberbullying victims, perpetrators…
Abstract
Purpose
This study aims to examine the effects of cyberbullying on the academic lives of Ghanaian university students. It also establishes whether cyberbullying victims, perpetrators, victim-perpetrators and bystanders differed in their thoughts on the effects of cyberbullying on students’ academic lives.
Design/methodology/approach
This study is anchored on Bandura’s theory of triadic reciprocal determinism and Abraham Maslow’s theory of needs. This study uses a cross-sectional survey design and quantitative approach to collect the data from 1,374 students from three public universities. The authors use descriptive statistics and ANOVA techniques to analyse the data.
Findings
The results show that the effects of cyberbullying on academic life are difficulty concentrating on studies, difficulty studying in groups and difficulty assessing important academic information online. There is also a statistically significant difference among cyberbullying victims, perpetrators, victim-perpetrators and bystanders in their thoughts on the effects of cyberbullying on students’ academic lives.
Originality/value
This research contributes to the literature on cyberbullying in the Ghanaian tertiary education environment. Even though the impact of cyberbullying on academics in Ghanaian universities may seem minimal, it is still imperative that it be checked, as it is significant enough to disrupt effective academic work. Thus, this study adds to the existing literature on cyberbullying from a developing country perspective.
Details
Keywords
Michalinos Zembylas and Zvi Bekerman
In this reflective essay, the authors explore how thinking with the notions of implication and complicity may encourage or hinder efforts to engage teachers in problematizing…
Abstract
Purpose
In this reflective essay, the authors explore how thinking with the notions of implication and complicity may encourage or hinder efforts to engage teachers in problematizing victim-perpetrator binaries in conflict-affected societies.
Design/methodology/approach
This reflective essay draws on lessons learned from the authors’ long-time work with teachers in Cyprus and Israel. The authors suggest that the concept of implication provides a productive framework for thinking about teachers’ professional responsibilities in more complex and nuanced ways.
Findings
The reflections of the two authors highlight the challenges and possibilities of overcoming essentialist categories of “victims” and “perpetrators” in conflict-affected societies.
Originality/value
This essay shows the (im)possibilities of transforming the prevailing binaries in communities experiencing political conflict.
Details
Keywords
Jaswadi Jaswadi, Hari Purnomo and Sumiadji Sumiadji
This study aims to investigate cases of fraudulent financial statements that have occurred in Indonesia and explore the similarities of cases that existed in the period before and…
Abstract
Purpose
This study aims to investigate cases of fraudulent financial statements that have occurred in Indonesia and explore the similarities of cases that existed in the period before and after the establishment of the Financial Services Authority.
Design/methodology/approach
This paper provides a descriptive examination of financial misstatements issued by different regimes by listed companies of the capital market and financial institution supervisory agency and the introduction of new financial service authority; among 93 listed companies that were subject to an official investigation arising from the publication of financial misstatements, these assessments were facilitated by mean of content analysis of annual reports following the announcement of an investigation.
Findings
The findings indicate that each regime has a specific pattern of financial statement fraud. It is found that senior management is responsible for most fraud, and recording a fictitious sale is the most common method of falsifying financial statements. Under the new regime, the publication of cases is limited since the introduction of risk-based supervision. Financial Services Authority is likely to fine and prosecute the director of a company as a perpetrator rather than a corporation as a legal entity.
Originality/value
This study contributes to the literature on the incidence of financial statement fraud in public companies and provides a detailed descriptive comparison of cases scrutinized by securities exchange commission in an emerging country.
Details